نتایج جستجو برای: intrusion response system

تعداد نتایج: 3050974  

Journal: :CoRR 2009
Farah Jemili Montaceur Zaghdoud Mohamed Ben Ahmed

This paper proposes an intrusion detection and prediction system based on uncertain and imprecise inference networks and its implementation. Giving a historic of sessions, it is about proposing a method of supervised learning doubled of a classifier permitting to extract the necessary knowledge in order to identify the presence or not of an intrusion in a session and in the positive case to rec...

2017
Rashmi Chaudhari Sonal Patil

An Intrusion detection system (IDS) is a device or a software application that monitors a network or systems for malicious activity or policy violations. Intrusion Detection Systems supports to discover, determine, and identify unauthorized use, duplication, alteration, and destruction of information systems. So, to make intrusion detection system more efficient, the techniques that are more ad...

2006
Liberios VOKOROKOS Anton BALÁŽ Martin CHOVANEC

The goal of the article is to presents intrusion detections systems and design architecture of intrusion detection based on neural network self organizing map. In the report is described base problematic of neural network and intrusion detection system. The article further deals with specific design of intrusion detection architecture based on user anomaly behavior. A core of the designed archi...

2007
H. Kooi J. Groen A. Leijnse

Analytical methods and numerical experiments are used to study salinization of groundwater in response to sea level rise. The system that is studied involves a saturated porous medium with an inclined upper surface. The upper surface is progressively inundated during sea level rise to simulate transgression, the landward migration of the shoreline. Four "modes" of seawater intrusion are disting...

2012
Raúl Sánchez Álvaro Herrero Emilio Corchado

MOVICAB-IDS has been previously proposed as a hybrid intelligent Intrusion Detection System (IDS). This on-going research aims to be one step towards adding automatic response to this visualization-based IDS by means of clustering techniques. As a sample case of study for the proposed clustering extension, it has been applied to the identification of different network scans. The aim is checking...

2012
Sharmila Devi Ritu Nagpal

Today we are suffering from many problems because of intruder interference in our communication with other person/organisation. We need a very safe and secure intrusion detection system. So, intrusion detection has become an important area of research The existing systems are not completely flawless and secure. So, there is the need to improve the existing system. In this paper, firstly we are ...

2004
Marina Del Rey JON B. VALENTE Clifford Neuman Dongho Kim Tatyana Ryutov

Current intrusion detection systems work in isolation from access control for the application the systems aim to protect. The lack of coordination and interoperation between these components prevents detecting and responding to ongoing attacks in real-time before they cause damage. To address this, we apply dynamic authorization techniques to support fine-grained access control and application ...

Journal: :IEEE Trans. Parallel Distrib. Syst. 2003
Tatyana Ryutov B. Clifford Neuman Dong-Ho Kim Li Zhou

Current intrusion detection systems work in isolation from access control for the application the systems aim to protect. The lack of coordination and interoperation between these components prevents detecting and responding to ongoing attacks in real-time before they cause damage. To address this, we apply dynamic authorization techniques to support fine-grained access control and application ...

Journal: :Cybernetics and Systems 2013
Raúl Sánchez Álvaro Herrero Emilio Corchado

Accurate intrusion detection still is an open challenge. Present work aims at being one step towards that purpose by studying the combination of clustering and visualization techniques. To do that, MOVICAB-IDS, previously proposed as a hybrid intelligent Intrusion Detection System (IDS) based on visualization techniques, is upgraded by adding automatic response thanks to clustering methods. To ...

Journal: :CoRR 2016
Gunupudi Rajesh Kumar Nimmala Mangathayaru Gugulothu Narsimha

Intrusion Detection is one of major threats for organization. The approach of intrusion detection using text processing has been one of research interests which is gaining significant importance from researchers. In text mining based approach for intrusion detection, system calls serve as source for mining and predicting possibility of intrusion or attack. When an application runs, there might ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید